-
Opening Remarks
- Grant Ongers
-
A Taste Of Privacy Threat Modeling
- Kim Wuyts
-
Far From Green Fields: Introducing
Threat Modelling To Established Teams
- Sarah-Jane Madden
-
GitHub Actions: Vulnerabilities,
Attacks, And Counter-Measures
- Magno Logan
-
Narrow – SCA Reachability
Analysis Without The Effort
- Josiah Bruner
-
JavaScript Realms: The Blank Spot
In Web Application Runtime Security
- Gal Weizman
-
OWASP Coraza:
The Way To WAF In 2023
- Felipe Zipitria & Juan Pablo Tosso
-
Attacking And Protecting
Artificial Intelligence
- Rob Van Der Veer
-
[T]OTPs Are Not As Secure
As You Might Believe
- Santiago Kantorowicz
-
Ten DevSecOps Culture Failures
- Chris Romero
-
Don't Let Bug Bounty
Kill Your Appsec Posture
- Zohar Shchar
-
Squeezing The Last Drop
Out Of OWASP Juice Shop
- Bjoern Kimminich
-
Why Winning The War In Cybersecurity
Means Winning More Of The Everyday Battles
- Jessica Robinson
-
Trusting Software: Runtime
Protection Is The Third Alternative
- Jeff Williams
-
Credential Sharing As A Service:
The Dark Side Of No Code
- Michael Bargury
-
Do More With Less Screen-Time:
A Modern Application Security Toolchain.
- Spyros Gasteratos
-
Preventing Subdomain Takeover
With OWASP Domain Protect
- Paul Schwarzenberger
-
Bootstrap And Increase Your Software
Assurance With OWASP SAMM V2.1
- Seba Deleersnyder & Bart De Win
-
Passwordless Future: Using
WebAuthn And Passkeys In Practice
- Clemens Hübner
-
Server Side Prototype Pollution
- Gareth Heyes
-
Empowering The Guardians
Of Your Code Kingdom
- Gabriel Manor
-
Philosophizing Security
In A "Mobile-First" World
- Sergiy Yakymchuk
-
Improving Supply Chain Security
With OWASP Dependency Track
- Vinod Anandan and Meha Bhargava & Niklas Jan Duster
-
Shifting Security Everywhere
- Tanya Janca
-
Removing Secrets To Make Your
Mobile Apps More MASVS-Secure
- Skip Hovsmith
-
CompRCEssed : Compressed File Manipulation
- Mehmet Önder Key
-
Developer Driven Security
In High-Growth Environments
- Jakub Kaluzny
-
What We've Learned From
Scanning 10K+ Kubernetes Clusters
- Ben Hirschberg
-
Testability Patterns For Web
Applications - A New OWASP Project
- Dr. Luca Compagna
-
Reduce Your Permissions Management Time While
Effectively Protecting Your Users, It's Possible!
- Marine Du Mesnil
-
Down The Rabbit Hole: A Journey Towards A
Weakness In Chrome & A New Hacking Technique
- Gil Cohen & Omri Inbar
-
How To Have Visibility And
Security OF A CICD Pipeline
- Pramod Rana
-
Hacking And Defending APIs:
Red And Blue Make Purple
- Matt Tesauro
-
OWASP SERVERLESS TOP 10
- Tal Melamed
-
AI-Assisted Coding: The Future Of Software
Development; Between Challenges And Benefits
- Dr. Magda Lilia Chelly
-
Get On With The Program:
Threat Modeling In And For Your Organization
- Izar Tarandach
-
OpenSSL Deep Dive:
The Good, The Bad And The Not-So-Ugly
- Dan Murphy & Frank Catucci
-
When Is A Vulnerability Not A Vulnerability?
Overcoming The Inundation Of Noisy Security Alerts
- Adam Berman
-
Log Story Short:
Chopping Through Forests Of Data
- Moti Harmats
-
Automated Security Testing
With OWASP Nettacker
- Sam Stepanyan
-
Not Your Parents' Cryptography:
Non-traditional Encryption Problems And Solutions
- Chuck Willis
-
Constructing A Precise Dynamic Control-Flow
Graph For EVM Based Smart Contracts
- Syue Siang Su
-
The Power Of DevSecOps
In Web3 And Blockchain
- Ken Toler
-
Let’s Cook: Contextual Vulnerabilities Are The
Ingredients And OWASP Top 10 Mapping The Seasoning
- Meghan Jacquot
-
"Mobile Wanderlust"!
Our Journey To Version 2.0!
- Sven Schleier
-
Closing Ceremony
- Matt Tesauro